getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Identity Management Software - Page 4

Last updated: April 2026

Verified reviewer profile picture
Get free expert advice+1 (888) 216-6745
Call now for a one-to-one consultation in under 15 mins.
1 filter applied

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


84 software options

IGA Toolkit logo

Identity governance and administration solution

learn more
IGA Toolkit is a web-based identity management software designed to help businesses streamline security administration and user identity processes across the organization. The solution facilitates automated testing of several security controls, such as access pattern analysis and user termination.

Read more about IGA Toolkit

Users also considered
Securden Unified PAM logo

Access Governance redefined for Hybrid environments

learn more
Consolidate and manage access to machine and human identities throughout your organization. Provide granular access to data and applications for all the identities and manage privileged identity access centrally. Get an overview of all the identities in your network with the holistic dashboard view.

Read more about Securden Unified PAM

Users also considered
ToothPic Key Protection SDK logo

Cloud-based authentication and identity management solution

learn more
ToothPic Key Protection SDK is a cloud-based authentication tool that helps businesses verify signatures, encrypt documents, and exchange cryptocurrency data on a unified platform.

Read more about ToothPic Key Protection SDK

Users also considered
GroupID logo

Group Lifecycle Management Solution

learn more
GroupID is a group and user management software that includes lifecycle and attestation policies to keep information up-to-date and secure.

Read more about GroupID

Users also considered
swIDch PLC-OTAC logo

Dynamic, Passwordless Security for Industrial Control

learn more
PLC-OTAC by swIDch is a single-step multi-factor authentication solution that utilizes dynamic one-time authentication codes to significantly increase security for programmable logic controllers (PLCs) with minimal disruption and computing requirements. This technology neutralizes common PLC vulnerabilities such as default passwords, password sharing, and credential theft, providing a highly secure and streamlined authentication process.

Read more about swIDch PLC-OTAC

Users also considered
TrustLogin logo

Cloud-based SSO and identity management software

learn more
TrustLogin is an IDaaS (Identity as a Service) solution that provides single sign-on (SSO) and centralized management of user identities and passwords for various cloud services, including Google Workspace (formerly G Suite), Microsoft 365 (formerly Office 365), Cybozu, Salesforce, and more.

Read more about TrustLogin

Users also considered
QDesk logo

Empowering Access, Redefining Privilege

learn more
QDesk provides secure, efficient, and compliant end-user access management.

Read more about QDesk

Users also considered
Securden logo

An industry-leading Privileged Access Management platform.

learn more
Manage privileged access to identities and protect them from compromise. Consolidate identities and manage granular access provisions.

Read more about Securden

Users also considered
Build38 logo

>The Next Generation mobile app security platform_

learn more
Build38 offers the future of mobile app security: a single, integrated platform with cloud-augmented AI and three layers of protection. We secure your apps and backend from all threats, freeing developers to innovate. Build with confidence.

Read more about Build38

Users also considered